Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless network security control method, device and wireless router

A security control and wireless network technology, applied in the fields of devices, wireless routers, and wireless network security control methods, can solve problems such as hidden dangers of local area network network security, equipment paralysis, network slowness, etc., and achieves sensitive response to flooding attacks and fast detection speed. , the effect of preventing flooding attacks

Active Publication Date: 2018-07-27
上海迈外迪网络科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, an ARP attack is an ARP spoofing by an attacker by forging IP addresses and MAC addresses, and continuously sending out response requests, thereby generating a large amount of ARP traffic in the network and seriously consuming network resources and device resources
For another example, the ICMP command can be used to check whether the network is unobstructed. By continuously sending ICMP packets, the wireless LAN is bombarded, causing the network to be slow or even the equipment to be paralyzed.
[0004] Existing wireless routers can realize wireless signal sending and receiving functions and data forwarding functions, but cannot effectively prevent the above-mentioned denial of service attacks, thus causing hidden dangers to the network security of the LAN

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network security control method, device and wireless router
  • Wireless network security control method, device and wireless router

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Currently, denial of service attack is a common and easy to cause serious damage among the attacks on wireless local area network. For example, in an ARP attack, attackers forge IP addresses and MAC addresses to perform ARP spoofing, and continuously send out response requests, thereby generating a large amount of ARP traffic in the network and seriously consuming network and device resources. For another example, the ICMP command can be used to check whether the network is unobstructed. By continuously sending ICMP data packets, the wireless LAN is bombarded, causing the network to be slow and even the equipment to be paralyzed. Existing wireless routers can realize the function of transmitting and receiving wireless signals and the function of data forwarding, but cannot effectively prevent the above-mentioned denial of service attacks, thereby causing hidden dangers to the network security of the local area network.

[0034] In the embodiment of the present invention...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A wireless network security control method, a wireless network security control device and a wireless router are provided. The wireless network security control method comprises the steps of receiving a radio-frequency signal sent by a connecting end, detecting the waveform of the radio-frequency signal, and judging that the connecting end is an attack source when the waveform of the radio-frequency signal is matched with a preset flooding attack waveform. Through the wireless network security control method, the wireless network security control device and the wireless router, denial-of-service attack against a wireless local area network can be distinguished effectively.

Description

technical field [0001] The present invention relates to the field of wireless technology, in particular to a wireless network security control method, device and wireless router. Background technique [0002] Among many computer networking technologies, wireless local area network plays an irreplaceable role in many application occasions due to its advantages of no wiring, low cost, and simple maintenance. As wireless LAN usage increases, it will extend wired LANs and perhaps replace them in some cases. It can be predicted that in the era of ubiquitous information in the future, wireless local area network will rely on its incomparable flexibility, mobility and strong scalability to obtain wider applications, so that people can really enjoy simple, convenient and fast connection . [0003] With the wide application of WLAN, its security issues are becoming more and more important. Currently, denial of service attacks, such as ARP attacks and ICMP attacks, are common attac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/101H04L63/1441
Inventor 唐仲春
Owner 上海迈外迪网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products